yggdrasil-go/src/yggdrasil/admin.go

716 lines
21 KiB
Go
Raw Normal View History

2018-01-21 03:17:15 +03:00
package yggdrasil
2018-06-13 01:50:08 +03:00
import (
"encoding/hex"
"encoding/json"
"errors"
"fmt"
"net"
"net/url"
"os"
"sort"
"strconv"
"strings"
"sync/atomic"
"time"
"yggdrasil/defaults"
2018-06-13 01:50:08 +03:00
)
2018-01-21 03:17:15 +03:00
// TODO: Add authentication
2018-01-21 03:17:15 +03:00
type admin struct {
core *Core
listenaddr string
2018-07-07 22:04:11 +03:00
listener net.Listener
2018-01-30 03:48:14 +03:00
handlers []admin_handlerInfo
}
2018-05-20 19:21:14 +03:00
type admin_info map[string]interface{}
2018-01-30 03:48:14 +03:00
type admin_handlerInfo struct {
2018-05-20 19:21:14 +03:00
name string // Checked against the first word of the api call
args []string // List of human-readable argument names
handler func(admin_info) (admin_info, error) // First is input map, second is output
}
// admin_pair maps things like "IP", "port", "bucket", or "coords" onto values.
2018-05-20 19:21:14 +03:00
type admin_pair struct {
key string
val interface{}
2018-01-30 03:48:14 +03:00
}
// admin_nodeInfo represents the information we know about a node for an admin response.
2018-05-20 19:21:14 +03:00
type admin_nodeInfo []admin_pair
2018-01-30 03:48:14 +03:00
// addHandler is called for each admin function to add the handler and help documentation to the API.
2018-05-20 19:21:14 +03:00
func (a *admin) addHandler(name string, args []string, handler func(admin_info) (admin_info, error)) {
2018-01-30 03:48:14 +03:00
a.handlers = append(a.handlers, admin_handlerInfo{name, args, handler})
2018-01-21 03:17:15 +03:00
}
// init runs the initial admin setup.
2018-01-21 03:17:15 +03:00
func (a *admin) init(c *Core, listenaddr string) {
a.core = c
a.listenaddr = listenaddr
2018-05-20 19:21:14 +03:00
a.addHandler("help", nil, func(in admin_info) (admin_info, error) {
handlers := make(map[string]interface{})
2018-01-30 03:48:14 +03:00
for _, handler := range a.handlers {
handlers[handler.name] = admin_info{"fields": handler.args}
2018-01-30 03:48:14 +03:00
}
return admin_info{"help": handlers}, nil
2018-01-30 03:48:14 +03:00
})
a.addHandler("dot", []string{}, func(in admin_info) (admin_info, error) {
2018-05-20 19:21:14 +03:00
return admin_info{"dot": string(a.getResponse_dot())}, nil
2018-01-30 03:48:14 +03:00
})
a.addHandler("getSelf", []string{}, func(in admin_info) (admin_info, error) {
self := a.getData_getSelf().asMap()
ip := fmt.Sprint(self["ip"])
delete(self, "ip")
return admin_info{"self": admin_info{ip: self}}, nil
})
a.addHandler("getPeers", []string{}, func(in admin_info) (admin_info, error) {
2018-05-20 19:21:14 +03:00
sort := "ip"
peers := make(admin_info)
for _, peerdata := range a.getData_getPeers() {
p := peerdata.asMap()
so := fmt.Sprint(p[sort])
peers[so] = p
delete(peers[so].(map[string]interface{}), sort)
}
return admin_info{"peers": peers}, nil
2018-01-30 03:48:14 +03:00
})
a.addHandler("getSwitchPeers", []string{}, func(in admin_info) (admin_info, error) {
2018-05-20 19:21:14 +03:00
sort := "port"
switchpeers := make(admin_info)
for _, s := range a.getData_getSwitchPeers() {
p := s.asMap()
so := fmt.Sprint(p[sort])
switchpeers[so] = p
delete(switchpeers[so].(map[string]interface{}), sort)
2018-02-28 16:43:06 +03:00
}
2018-05-20 19:21:14 +03:00
return admin_info{"switchpeers": switchpeers}, nil
2018-02-28 16:43:06 +03:00
})
a.addHandler("getDHT", []string{}, func(in admin_info) (admin_info, error) {
2018-05-20 19:21:14 +03:00
sort := "ip"
dht := make(admin_info)
for _, d := range a.getData_getDHT() {
p := d.asMap()
so := fmt.Sprint(p[sort])
dht[so] = p
delete(dht[so].(map[string]interface{}), sort)
}
2018-05-20 19:21:14 +03:00
return admin_info{"dht": dht}, nil
})
a.addHandler("getSessions", []string{}, func(in admin_info) (admin_info, error) {
2018-05-20 19:21:14 +03:00
sort := "ip"
sessions := make(admin_info)
for _, s := range a.getData_getSessions() {
p := s.asMap()
so := fmt.Sprint(p[sort])
sessions[so] = p
delete(sessions[so].(map[string]interface{}), sort)
2018-05-10 11:48:12 +03:00
}
2018-05-20 19:21:14 +03:00
return admin_info{"sessions": sessions}, nil
2018-05-10 11:48:12 +03:00
})
a.addHandler("addPeer", []string{"uri", "[interface]"}, func(in admin_info) (admin_info, error) {
// Set sane defaults
intf := ""
// Has interface been specified?
if itf, ok := in["interface"]; ok {
intf = itf.(string)
}
if a.addPeer(in["uri"].(string), intf) == nil {
return admin_info{
"added": []string{
in["uri"].(string),
},
}, nil
} else {
return admin_info{
"not_added": []string{
in["uri"].(string),
},
}, errors.New("Failed to add peer")
}
})
a.addHandler("removePeer", []string{"port"}, func(in admin_info) (admin_info, error) {
if a.removePeer(fmt.Sprint(in["port"])) == nil {
return admin_info{
"removed": []string{
fmt.Sprint(in["port"]),
},
}, nil
} else {
return admin_info{
"not_removed": []string{
fmt.Sprint(in["port"]),
},
}, errors.New("Failed to remove peer")
}
})
a.addHandler("getTunTap", []string{}, func(in admin_info) (r admin_info, e error) {
2018-05-20 21:42:37 +03:00
defer func() {
recover()
r = admin_info{"none": admin_info{}}
2018-05-20 21:42:37 +03:00
e = nil
}()
2018-05-20 19:21:14 +03:00
2018-05-20 21:42:37 +03:00
return admin_info{
a.core.tun.iface.Name(): admin_info{
"tap_mode": a.core.tun.iface.IsTAP(),
"mtu": a.core.tun.mtu,
},
2018-05-20 21:42:37 +03:00
}, nil
})
a.addHandler("setTunTap", []string{"name", "[tap_mode]", "[mtu]"}, func(in admin_info) (admin_info, error) {
// Set sane defaults
iftapmode := defaults.GetDefaults().DefaultIfTAPMode
ifmtu := defaults.GetDefaults().DefaultIfMTU
// Has TAP mode been specified?
if tap, ok := in["tap_mode"]; ok {
iftapmode = tap.(bool)
}
// Check we have enough params for MTU
if mtu, ok := in["mtu"]; ok {
if mtu.(float64) >= 1280 && ifmtu <= defaults.GetDefaults().MaximumIfMTU {
ifmtu = int(in["mtu"].(float64))
2018-05-20 19:21:14 +03:00
}
}
// Start the TUN adapter
if err := a.startTunWithMTU(in["name"].(string), iftapmode, ifmtu); err != nil {
return admin_info{}, errors.New("Failed to configure adapter")
} else {
return admin_info{
a.core.tun.iface.Name(): admin_info{
"tap_mode": a.core.tun.iface.IsTAP(),
"mtu": ifmtu,
},
}, nil
}
})
a.addHandler("getMulticastInterfaces", []string{}, func(in admin_info) (admin_info, error) {
var intfs []string
for _, v := range a.core.multicast.interfaces() {
intfs = append(intfs, v.Name)
}
return admin_info{"multicast_interfaces": intfs}, nil
})
a.addHandler("getAllowedEncryptionPublicKeys", []string{}, func(in admin_info) (admin_info, error) {
return admin_info{"allowed_box_pubs": a.getAllowedEncryptionPublicKeys()}, nil
})
2018-06-23 00:26:17 +03:00
a.addHandler("addAllowedEncryptionPublicKey", []string{"key"}, func(in admin_info) (admin_info, error) {
if a.addAllowedEncryptionPublicKey(in["key"].(string)) == nil {
return admin_info{
"added": []string{
2018-06-23 00:26:17 +03:00
in["key"].(string),
},
}, nil
} else {
return admin_info{
"not_added": []string{
2018-06-23 00:26:17 +03:00
in["key"].(string),
},
2018-06-23 00:26:17 +03:00
}, errors.New("Failed to add allowed key")
}
})
2018-06-23 00:26:17 +03:00
a.addHandler("removeAllowedEncryptionPublicKey", []string{"key"}, func(in admin_info) (admin_info, error) {
if a.removeAllowedEncryptionPublicKey(in["key"].(string)) == nil {
return admin_info{
"removed": []string{
2018-06-23 00:26:17 +03:00
in["key"].(string),
},
}, nil
} else {
return admin_info{
"not_removed": []string{
2018-06-23 00:26:17 +03:00
in["key"].(string),
},
2018-06-23 00:26:17 +03:00
}, errors.New("Failed to remove allowed key")
}
})
2018-05-28 00:13:37 +03:00
}
// start runs the admin API socket to listen for / respond to admin API calls.
2018-05-28 00:13:37 +03:00
func (a *admin) start() error {
2018-01-21 03:17:15 +03:00
go a.listen()
2018-05-28 00:13:37 +03:00
return nil
2018-01-21 03:17:15 +03:00
}
// cleans up when stopping
2018-07-07 22:04:11 +03:00
func (a *admin) close() error {
return a.listener.Close()
}
// listen is run by start and manages API connections.
2018-01-21 03:17:15 +03:00
func (a *admin) listen() {
u, err := url.Parse(a.listenaddr)
if err == nil {
switch strings.ToLower(u.Scheme) {
case "unix":
2018-07-07 22:04:11 +03:00
a.listener, err = net.Listen("unix", a.listenaddr[7:])
case "tcp":
2018-07-07 22:04:11 +03:00
a.listener, err = net.Listen("tcp", u.Host)
default:
2018-07-08 12:37:20 +03:00
// err = errors.New(fmt.Sprint("protocol not supported: ", u.Scheme))
a.listener, err = net.Listen("tcp", a.listenaddr)
}
} else {
2018-07-07 22:04:11 +03:00
a.listener, err = net.Listen("tcp", a.listenaddr)
}
2018-01-21 03:17:15 +03:00
if err != nil {
a.core.log.Printf("Admin socket failed to listen: %v", err)
os.Exit(1)
}
2018-07-07 22:04:11 +03:00
a.core.log.Printf("%s admin socket listening on %s",
strings.ToUpper(a.listener.Addr().Network()),
a.listener.Addr().String())
defer a.listener.Close()
2018-01-21 03:17:15 +03:00
for {
2018-07-07 22:04:11 +03:00
conn, err := a.listener.Accept()
2018-01-21 03:17:15 +03:00
if err == nil {
a.handleRequest(conn)
}
}
}
// handleRequest calls the request handler for each request sent to the admin API.
2018-01-21 03:17:15 +03:00
func (a *admin) handleRequest(conn net.Conn) {
2018-05-20 19:21:14 +03:00
decoder := json.NewDecoder(conn)
encoder := json.NewEncoder(conn)
encoder.SetIndent("", " ")
recv := make(admin_info)
send := make(admin_info)
defer func() {
r := recover()
if r != nil {
send = admin_info{
"status": "error",
"error": "Unrecoverable error, possibly as a result of invalid input types or malformed syntax",
}
fmt.Println("Admin socket error:", r)
if err := encoder.Encode(&send); err != nil {
fmt.Println("Admin socket JSON encode error:", err)
}
conn.Close()
}
}()
2018-05-20 19:21:14 +03:00
for {
// Start with a clean slate on each request
recv = admin_info{}
send = admin_info{}
// Decode the input
2018-05-20 19:21:14 +03:00
if err := decoder.Decode(&recv); err != nil {
2018-05-21 09:28:03 +03:00
// fmt.Println("Admin socket JSON decode error:", err)
2018-05-20 19:21:14 +03:00
return
}
// Send the request back with the response, and default to "error"
// unless the status is changed below by one of the handlers
send["request"] = recv
send["status"] = "error"
2018-05-20 19:21:14 +03:00
handlers:
for _, handler := range a.handlers {
// We've found the handler that matches the request
2018-07-09 21:30:41 +03:00
if strings.ToLower(recv["request"].(string)) == strings.ToLower(handler.name) {
2018-05-20 19:21:14 +03:00
// Check that we have all the required arguments
for _, arg := range handler.args {
// An argument in [square brackets] is optional and not required,
2018-05-20 19:21:14 +03:00
// so we can safely ignore those
if strings.HasPrefix(arg, "[") && strings.HasSuffix(arg, "]") {
2018-05-20 19:21:14 +03:00
continue
}
// Check if the field is missing
if _, ok := recv[arg]; !ok {
send = admin_info{
2018-05-21 01:25:07 +03:00
"status": "error",
"error": "Expected field missing: " + arg,
"expecting": arg,
2018-05-20 19:21:14 +03:00
}
break handlers
}
}
// By this point we should have all the fields we need, so call
// the handler
response, err := handler.handler(recv)
if err != nil {
send["error"] = err.Error()
if response != nil {
send["response"] = response
2018-05-20 19:21:14 +03:00
}
} else {
send["status"] = "success"
if response != nil {
send["response"] = response
2018-05-20 19:21:14 +03:00
}
}
2018-05-20 19:21:14 +03:00
break
}
}
// Send the response back
2018-05-20 19:21:14 +03:00
if err := encoder.Encode(&send); err != nil {
return
}
// If "keepalive" isn't true then close the connection
if keepalive, ok := recv["keepalive"]; !ok || !keepalive.(bool) {
conn.Close()
}
2018-05-20 19:21:14 +03:00
}
2018-01-30 03:48:14 +03:00
}
// asMap converts an admin_nodeInfo into a map of key/value pairs.
2018-05-20 19:21:14 +03:00
func (n *admin_nodeInfo) asMap() map[string]interface{} {
m := make(map[string]interface{}, len(*n))
2018-01-30 03:48:14 +03:00
for _, p := range *n {
m[p.key] = p.val
}
return m
}
// toString creates a printable string representation of an admin_nodeInfo.
2018-01-30 03:48:14 +03:00
func (n *admin_nodeInfo) toString() string {
// TODO return something nicer looking than this
var out []string
for _, p := range *n {
out = append(out, fmt.Sprintf("%v: %v", p.key, p.val))
}
return strings.Join(out, ", ")
return fmt.Sprint(*n)
}
// printInfos returns a newline separated list of strings from admin_nodeInfos, e.g. a printable string of info about all peers.
2018-01-30 03:48:14 +03:00
func (a *admin) printInfos(infos []admin_nodeInfo) string {
var out []string
for _, info := range infos {
out = append(out, info.toString())
}
out = append(out, "") // To add a trailing "\n" in the join
return strings.Join(out, "\n")
}
// addPeer triggers a connection attempt to a node.
func (a *admin) addPeer(addr string, sintf string) error {
u, err := url.Parse(addr)
if err == nil {
switch strings.ToLower(u.Scheme) {
case "tcp":
a.core.tcp.connect(u.Host, sintf)
case "socks":
2018-05-28 00:13:37 +03:00
a.core.tcp.connectSOCKS(u.Host, u.Path[1:])
default:
return errors.New("invalid peer: " + addr)
2018-02-28 16:43:06 +03:00
}
} else {
// no url scheme provided
addr = strings.ToLower(addr)
if strings.HasPrefix(addr, "tcp:") {
addr = addr[4:]
2018-02-28 16:43:06 +03:00
}
a.core.tcp.connect(addr, "")
return nil
2018-02-28 16:43:06 +03:00
}
return nil
}
// removePeer disconnects an existing node (given by the node's port number).
func (a *admin) removePeer(p string) error {
iport, err := strconv.Atoi(p)
if err != nil {
return err
}
a.core.peers.removePeer(switchPort(iport))
return nil
}
// startTunWithMTU creates the tun/tap device, sets its address, and sets the MTU to the provided value.
2018-02-28 18:15:57 +03:00
func (a *admin) startTunWithMTU(ifname string, iftapmode bool, ifmtu int) error {
// Close the TUN first if open
_ = a.core.tun.close()
// Then reconfigure and start it
addr := a.core.router.addr
straddr := fmt.Sprintf("%s/%v", net.IP(addr[:]).String(), 8*len(address_prefix)-1)
2018-02-28 18:15:57 +03:00
if ifname != "none" {
err := a.core.tun.setup(ifname, iftapmode, straddr, ifmtu)
if err != nil {
return err
}
// If we have open sessions then we need to notify them
// that our MTU has now changed
for _, sinfo := range a.core.sessions.sinfos {
if ifname == "none" {
sinfo.myMTU = 0
} else {
sinfo.myMTU = uint16(ifmtu)
}
a.core.sessions.sendPingPong(sinfo, false)
}
// Aaaaand... go!
2018-02-28 18:15:57 +03:00
go a.core.tun.read()
}
go a.core.tun.write()
return nil
}
// getData_getSelf returns the self node's info for admin responses.
2018-01-30 03:48:14 +03:00
func (a *admin) getData_getSelf() *admin_nodeInfo {
table := a.core.switchTable.table.Load().(lookupTable)
coords := table.self.getCoords()
self := admin_nodeInfo{
2018-05-28 00:13:37 +03:00
{"ip", a.core.GetAddress().String()},
{"subnet", a.core.GetSubnet().String()},
2018-01-30 03:48:14 +03:00
{"coords", fmt.Sprint(coords)},
}
return &self
}
// getData_getPeers returns info from Core.peers for an admin response.
2018-01-30 03:48:14 +03:00
func (a *admin) getData_getPeers() []admin_nodeInfo {
ports := a.core.peers.ports.Load().(map[switchPort]*peer)
var peerInfos []admin_nodeInfo
var ps []switchPort
for port := range ports {
ps = append(ps, port)
}
sort.Slice(ps, func(i, j int) bool { return ps[i] < ps[j] })
for _, port := range ps {
p := ports[port]
addr := *address_addrForNodeID(getNodeID(&p.box))
info := admin_nodeInfo{
2018-05-20 19:21:14 +03:00
{"ip", net.IP(addr[:]).String()},
{"port", port},
{"uptime", int(time.Since(p.firstSeen).Seconds())},
{"bytes_sent", atomic.LoadUint64(&p.bytesSent)},
{"bytes_recvd", atomic.LoadUint64(&p.bytesRecvd)},
}
peerInfos = append(peerInfos, info)
}
return peerInfos
}
// getData_getSwitchPeers returns info from Core.switchTable for an admin response.
func (a *admin) getData_getSwitchPeers() []admin_nodeInfo {
2018-01-30 03:48:14 +03:00
var peerInfos []admin_nodeInfo
table := a.core.switchTable.table.Load().(lookupTable)
peers := a.core.peers.ports.Load().(map[switchPort]*peer)
for _, elem := range table.elems {
peer, isIn := peers[elem.port]
if !isIn {
continue
}
2018-01-30 03:48:14 +03:00
addr := *address_addrForNodeID(getNodeID(&peer.box))
coords := elem.locator.getCoords()
info := admin_nodeInfo{
2018-05-20 19:21:14 +03:00
{"ip", net.IP(addr[:]).String()},
2018-01-30 03:48:14 +03:00
{"coords", fmt.Sprint(coords)},
2018-05-20 19:21:14 +03:00
{"port", elem.port},
}
2018-01-30 03:48:14 +03:00
peerInfos = append(peerInfos, info)
}
return peerInfos
}
// getData_getDHT returns info from Core.dht for an admin response.
2018-01-30 03:48:14 +03:00
func (a *admin) getData_getDHT() []admin_nodeInfo {
var infos []admin_nodeInfo
now := time.Now()
2018-01-30 03:48:14 +03:00
getDHT := func() {
for i := 0; i < a.core.dht.nBuckets(); i++ {
b := a.core.dht.getBucket(i)
getInfo := func(vs []*dhtInfo, isPeer bool) {
for _, v := range vs {
addr := *address_addrForNodeID(v.getNodeID())
info := admin_nodeInfo{
2018-05-20 19:21:14 +03:00
{"ip", net.IP(addr[:]).String()},
{"coords", fmt.Sprint(v.coords)},
2018-05-20 19:21:14 +03:00
{"bucket", i},
{"peer_only", isPeer},
{"last_seen", int(now.Sub(v.recv).Seconds())},
}
infos = append(infos, info)
}
}
getInfo(b.other, false)
getInfo(b.peers, true)
}
2018-01-30 03:48:14 +03:00
}
a.core.router.doAdmin(getDHT)
return infos
}
// getData_getSessions returns info from Core.sessions for an admin response.
2018-01-30 03:48:14 +03:00
func (a *admin) getData_getSessions() []admin_nodeInfo {
var infos []admin_nodeInfo
getSessions := func() {
for _, sinfo := range a.core.sessions.sinfos {
// TODO? skipped known but timed out sessions?
info := admin_nodeInfo{
2018-05-20 19:21:14 +03:00
{"ip", net.IP(sinfo.theirAddr[:]).String()},
2018-01-30 03:48:14 +03:00
{"coords", fmt.Sprint(sinfo.coords)},
2018-05-20 19:21:14 +03:00
{"mtu", sinfo.getMTU()},
{"was_mtu_fixed", sinfo.wasMTUFixed},
{"bytes_sent", sinfo.bytesSent},
{"bytes_recvd", sinfo.bytesRecvd},
}
2018-01-30 03:48:14 +03:00
infos = append(infos, info)
}
2018-01-30 03:48:14 +03:00
}
a.core.router.doAdmin(getSessions)
return infos
}
// getAllowedEncryptionPublicKeys returns the public keys permitted for incoming peer connections.
func (a *admin) getAllowedEncryptionPublicKeys() []string {
pubs := a.core.peers.getAllowedEncryptionPublicKeys()
var out []string
for _, pub := range pubs {
out = append(out, hex.EncodeToString(pub[:]))
}
return out
}
// addAllowedEncryptionPublicKey whitelists a key for incoming peer connections.
func (a *admin) addAllowedEncryptionPublicKey(bstr string) (err error) {
boxBytes, err := hex.DecodeString(bstr)
2018-05-07 03:48:26 +03:00
if err == nil {
var box boxPubKey
copy(box[:], boxBytes)
a.core.peers.addAllowedEncryptionPublicKey(&box)
}
return
}
// removeAllowedEncryptionPublicKey removes a key from the whitelist for incoming peer connections.
// If none are set, an empty list permits all incoming connections.
func (a *admin) removeAllowedEncryptionPublicKey(bstr string) (err error) {
boxBytes, err := hex.DecodeString(bstr)
2018-05-07 03:48:26 +03:00
if err == nil {
var box boxPubKey
copy(box[:], boxBytes)
a.core.peers.removeAllowedEncryptionPublicKey(&box)
}
return
}
// getResponse_dot returns a response for a graphviz dot formatted representation of the known parts of the network.
// This is color-coded and labeled, and includes the self node, switch peers, nodes known to the DHT, and nodes with open sessions.
// The graph is structured as a tree with directed links leading away from the root.
2018-01-30 03:48:14 +03:00
func (a *admin) getResponse_dot() []byte {
2018-06-01 04:28:09 +03:00
self := a.getData_getSelf()
peers := a.getData_getSwitchPeers()
2018-01-30 03:48:14 +03:00
dht := a.getData_getDHT()
sessions := a.getData_getSessions()
// Start building a tree from all known nodes
type nodeInfo struct {
2018-06-01 04:28:09 +03:00
name string
key string
parent string
2018-07-21 07:02:25 +03:00
port switchPort
2018-06-01 04:28:09 +03:00
options string
2018-01-30 03:48:14 +03:00
}
infos := make(map[string]nodeInfo)
2018-07-21 07:02:25 +03:00
// Get coords as a slice of strings, FIXME? this looks very fragile
coordSlice := func(coords string) []string {
tmp := strings.Replace(coords, "[", "", -1)
tmp = strings.Replace(tmp, "]", "", -1)
return strings.Split(tmp, " ")
}
2018-01-30 03:48:14 +03:00
// First fill the tree with all known nodes, no parents
addInfo := func(nodes []admin_nodeInfo, options string, tag string) {
2018-06-01 04:28:09 +03:00
for _, node := range nodes {
n := node.asMap()
info := nodeInfo{
key: n["coords"].(string),
options: options,
}
if len(tag) > 0 {
info.name = fmt.Sprintf("%s\n%s", n["ip"].(string), tag)
} else {
info.name = n["ip"].(string)
}
2018-07-21 07:02:25 +03:00
coordsSplit := coordSlice(info.key)
if len(coordsSplit) != 0 {
portStr := coordsSplit[len(coordsSplit)-1]
portUint, err := strconv.ParseUint(portStr, 10, 64)
if err == nil {
info.port = switchPort(portUint)
}
}
2018-06-01 04:28:09 +03:00
infos[info.key] = info
}
2018-01-30 03:48:14 +03:00
}
2018-06-02 23:21:05 +03:00
addInfo(dht, "fillcolor=\"#ffffff\" style=filled fontname=\"sans serif\"", "Known in DHT") // white
addInfo(sessions, "fillcolor=\"#acf3fd\" style=filled fontname=\"sans serif\"", "Open session") // blue
addInfo(peers, "fillcolor=\"#ffffb5\" style=filled fontname=\"sans serif\"", "Connected peer") // yellow
addInfo(append([]admin_nodeInfo(nil), *self), "fillcolor=\"#a5ff8a\" style=filled fontname=\"sans serif\"", "This node") // green
2018-01-30 03:48:14 +03:00
// Now go through and create placeholders for any missing nodes
for _, info := range infos {
// This is ugly string manipulation
coordsSplit := coordSlice(info.key)
for idx := range coordsSplit {
key := fmt.Sprintf("[%v]", strings.Join(coordsSplit[:idx], " "))
newInfo, isIn := infos[key]
if isIn {
continue
}
2018-01-30 03:48:14 +03:00
newInfo.name = "?"
newInfo.key = key
newInfo.options = "fontname=\"sans serif\" style=dashed color=\"#999999\" fontcolor=\"#999999\""
2018-01-30 03:48:14 +03:00
infos[key] = newInfo
}
2018-01-30 03:48:14 +03:00
}
// Now go through and attach parents
for _, info := range infos {
pSplit := coordSlice(info.key)
if len(pSplit) > 0 {
pSplit = pSplit[:len(pSplit)-1]
}
2018-01-30 03:48:14 +03:00
info.parent = fmt.Sprintf("[%v]", strings.Join(pSplit, " "))
infos[info.key] = info
}
// Finally, get a sorted list of keys, which we use to organize the output
var keys []string
for _, info := range infos {
keys = append(keys, info.key)
}
2018-06-13 01:50:08 +03:00
// sort
2018-07-21 07:02:25 +03:00
sort.SliceStable(keys, func(i, j int) bool {
2018-01-30 03:48:14 +03:00
return keys[i] < keys[j]
2018-07-21 07:02:25 +03:00
})
sort.SliceStable(keys, func(i, j int) bool {
return infos[keys[i]].port < infos[keys[j]].port
})
2018-01-30 03:48:14 +03:00
// Now print it all out
var out []byte
put := func(s string) {
out = append(out, []byte(s)...)
}
put("digraph {\n")
// First set the labels
for _, key := range keys {
info := infos[key]
2018-06-01 04:28:09 +03:00
put(fmt.Sprintf("\"%v\" [ label = \"%v\" %v ];\n", info.key, info.name, info.options))
2018-01-21 03:17:15 +03:00
}
2018-01-30 03:48:14 +03:00
// Then print the tree structure
for _, key := range keys {
info := infos[key]
if info.key == info.parent {
continue
} // happens for the root, skip it
2018-07-21 07:02:25 +03:00
port := fmt.Sprint(info.port)
style := "fontname=\"sans serif\""
if infos[info.parent].name == "?" || infos[info.key].name == "?" {
style = "fontname=\"sans serif\" style=dashed color=\"#999999\" fontcolor=\"#999999\""
}
put(fmt.Sprintf(" \"%+v\" -> \"%+v\" [ label = \"%v\" %s ];\n", info.parent, info.key, port, style))
2018-01-21 03:17:15 +03:00
}
2018-01-30 03:48:14 +03:00
put("}\n")
return out
2018-01-21 03:17:15 +03:00
}